US8578153B2 - Method and arrangement for provisioning and managing a device - Google Patents
Method and arrangement for provisioning and managing a device Download PDFInfo
- Publication number
- US8578153B2 US8578153B2 US12/606,490 US60649009A US8578153B2 US 8578153 B2 US8578153 B2 US 8578153B2 US 60649009 A US60649009 A US 60649009A US 8578153 B2 US8578153 B2 US 8578153B2
- Authority
- US
- United States
- Prior art keywords
- key
- operator
- new
- old
- subscription
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000008859 change Effects 0.000 claims abstract description 73
- 238000004891 communication Methods 0.000 claims description 73
- 230000000977 initiatory effect Effects 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 34
- 238000010586 diagram Methods 0.000 description 20
- 101150042248 Mgmt gene Proteins 0.000 description 10
- 230000008569 process Effects 0.000 description 5
- 238000010200 validation analysis Methods 0.000 description 5
- 238000009795 derivation Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- JEIPFZHSYJVQDO-UHFFFAOYSA-N iron(III) oxide Inorganic materials O=[Fe]O[Fe]=O JEIPFZHSYJVQDO-UHFFFAOYSA-N 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
Definitions
- the present invention relates to radio telecommunication systems. More particularly, and not by way of limitation, the present invention is directed to an apparatus and method for remote initial provisioning of Universal Subscriber Identity Modules (USIMs) and subsequent changing of an operator.
- USIMs Universal Subscriber Identity Modules
- a typical use case for an M2M device is electric metering.
- an electric supplier company installs automatic metering devices that report the amount of consumed electricity back to the billing department via a 3GPP network. Since millions of such devices may be installed, remote management of subscriptions would greatly reduce costs, for example, in the case of a change of subscription.
- the end user and the owner of the devices is an enterprise with a large number of devices in the field. Thus, it is likely that the owner will have its own servers that can manage the devices.
- Another use case is for built-in terminals in cars.
- it is a single owner of the car that would like to control which telecommunication operator the car is using, and also the services to which the car is attached such as insurance service, maintenance services, and road toll services.
- a car owner's mobile terminal could function as the enterprise server above, containing all the necessary intelligence to manage the car.
- the existing 3GPP architecture and remotely managed procedure for provisioning an M2M device is complex and still leaves security gaps.
- a Platform Validation Authority (PVA) certificate is installed as a trusted certificate in a M2ME device.
- PVA Platform Validation Authority
- all operators with a certificate signed by the PVA are able to perform a valid provisioning of the M2M device. This creates the problem commonly referred to as slamming, i.e., illegal changing of subscribers telephone service without their consent.
- SHO Selected Home Operator
- An embodiment of the present invention provides the device with the ability to authenticate that a provisioning of the device is actually initiated by the owner of the device.
- the invention also provides the device with the ability to authenticate the Discovery and Registration Function (DRF) involved in a change of operator.
- DRF Discovery and Registration Function
- a symmetric key K PIMSI is first used to give initial air time, and following this, an asymmetric (or in some cases, symmetric) key K Provision is used to download the DLUSIM.
- K PIMSI When the operator is changed, a new K PIMSI may be needed, and the invention provides the ability to send a command to the remote device to authorize the change of operator.
- different end-user services may request to set up secure end-to-end connections. This can be done by allowing the end-user services to download their specific clients onto the device. If this is done, it should be done only with the authorization from the device owner.
- the key hierarchy can be used to achieve easier operator change and also to facilitate secure end-to-end service set-up.
- a device is configured with a device key K Device and a plurality of one-way functions enabling derivation of a key hierarchy.
- K Device the management activities are simplified.
- the present invention derives all other keys from this single K Device with one-way functions known to the device and device owner, denoted by h i ( ), 0 ⁇ i ⁇ 6.
- the invention also simplifies the device-manufacturing process and the usability for the end-user, independent of whether the end-user is an enterprise or a consumer. It is also much easier to let the device change its purpose over time.
- the invention provides a method for updating the device key and for changing a subscriber key.
- the invention provides a modified M2M device and owner node.
- the owner node is implemented as an enterprise server or as a mobile entity (ME).
- Characteristic features of the invention relate to a key-hierarchy extending the DLUSIM framework to also cover general M2M applications and incorporating it into the general Open Mobile Alliance Device Management (OMA DM) framework.
- OMA DM Open Mobile Alliance Device Management
- a further extension relates to how to change K Device , and how to change the subscription key without sending it over the cellular channel.
- the present invention is directed to a method of securely changing control of a device from an old manager to a new manager, wherein the device obeys commands from a manager only if the commands include a device key known to the device.
- the method includes the steps of initiating the change of control by the old manager, the initiating step including changing a first device key in use between the old manager and the device to a second device key, and sending the second device key from the old manager to the new manager, preferably over a secure connection.
- the method also includes completing the change of control by the new manager, the completing step including changing the second device key in use between the new manager and the device to a third device key. Upon completion of the change of control, the new manager does not know the first device key and the old manager does not know the third device key.
- the present invention is directed to a method of securely changing a communication device from an old operator to a new operator, wherein the communication device has a subscription key and obeys commands from an operator only if the commands include an authentication key known to the communication device.
- the method includes the steps of initiating the change of operator by a manager of the communication device; in response to the initiating step, changing a first subscription key in use between the old operator and the communication device to a second subscription key; sending the second subscription key from the old operator to the new operator; and completing the change of operator by the new operator.
- the completing step includes changing the second subscription key in use between the new operator and the communication device to a third subscription key.
- the new operator does not know the first subscription key and the old operator does not know the third subscription key.
- the present invention is directed to a first owner node in a telecommunication network for securely changing ownership of a communication device from the first owner node to a second owner node, wherein the communication device obeys commands from owner nodes only if the commands include a device key known to the communication device.
- the first owner node includes communication means for sending a command to the communication device to change a currently active device key to a new device key, the command including the currently active device key and a secret parameter known by the first owner node; means for calculating the new device key utilizing the currently active device key and the secret parameter; and communication means for sending the new device key to the second owner node.
- the present invention is directed to a second owner node in a telecommunication network for securely obtaining ownership of a communication device from a first owner node, wherein the communication device obeys commands from owner nodes only if the commands include a device key known to the communication device.
- the second owner node includes communication means for receiving from the first owner node, a currently active device key for the communication device; communication means for sending a command to the communication device to change the currently active device key to a new device key, the command including the currently active device key and a secret parameter known by the second owner node; and means for calculating the new device key utilizing the currently active device key and the secret parameter.
- the present invention is directed to a system for securely changing a communication device from an old operator network to a new operator network, wherein the communication device has a subscription key and obeys commands from an operator network only if the commands include an authentication key known to the communication device.
- the system includes an owner node of the communication device for initiating the change of operator network by sending a subscription registration message to the new operator network, the subscription registration message including first and second authentication keys and an identifier of the communication device; communication means within the new operator network for sending a notification to the old operator network indicating that the new operator network has a new subscription with the communication device; and communication means within the old operator network for sending a command to the communication device to change a currently active first subscription key to a second subscription key, the command including a currently active authentication key and a secret parameter known by the old operator network.
- the system also includes means within the communication device for calculating the second subscription key utilizing the first subscription key and the secret parameter received from the old operator network; means within the old operator network for calculating the second subscription key; and communication means within the old operator network for sending the second subscription key to the new operator network.
- the system also includes communication means within the new operator network for sending a command to the communication device to change the second subscription key to a third subscription key, the command including the first authentication key received from the owner node and a secret parameter known by the new operator network; means within the communication device for calculating the third subscription key utilizing the second subscription key and the secret parameter received from the new operator network; and means within the new operator network for calculating the third subscription key.
- the present invention is directed to a method of downloading a new Downloadable Universal Subscriber Identity Module (DLUSIM) to a communication device while changing the communication device from a first operator network to a second operator network.
- the method begins by a manager of the communication device registering with the second operator network, wherein the registering step includes transferring K Auth to the second operator network.
- the communication device then receives a bootstrapping message instructing the device to connect to a provisioning service of the new operator network, wherein the bootstrapping message includes an address of the provisioning service of the new operator network and an authentication nonce.
- the new operator network then validates the communication device when the communication device attempts to connect to the provisioning service.
- the second operator network generating a new DLUSIM and encrypting the DLUSIM with K Provision ; and downloading the DLUSIM as an encrypted blob to the communication device from an Open Mobile Alliance Device Management (OMA DM) provisioning server in the second operator network.
- OMA DM Open Mobile Alliance Device Management
- FIG. 1 is a high level message flow diagram illustrating an existing architecture and remotely managed procedure for changing an operator for an M2M device
- FIGS. 2A-2B are simplified block diagrams illustrating two deployment scenarios according to the teachings of the present invention.
- FIG. 3 is a simplified block diagram of an M2M device in an exemplary embodiment of the present invention.
- FIG. 4 is a simplified block diagram of an enterprise server in an exemplary embodiment of the present invention.
- FIG. 5 is a simplified block diagram of a device owner's mobile equipment (ME) in an exemplary embodiment of the present invention
- FIG. 6 is a message flow diagram illustrating a procedure for changing a device owner in an exemplary embodiment of the present invention
- FIG. 7 is a message flow diagram illustrating a procedure for changing a device key before and after a change of owner in an exemplary embodiment of the present invention
- FIG. 8 is a message flow diagram illustrating a procedure for changing an operator with the change of a subscriber key in an exemplary embodiment of the present invention
- FIG. 9 is a message flow diagram illustrating in more detail the procedure for changing an operator in an exemplary embodiment of the present invention.
- FIG. 10 is a message flow diagram illustrating a procedure for downloading a new DLUSIM as an encrypted blob in an exemplary embodiment of the present invention.
- FIG. 1 is a high level message flow diagram illustrating an existing architecture and remotely managed procedure for changing an operator for an M2M device 11 .
- An Old Home Operator (OHO) 12 which includes a Home Subscriber Server/Authentication Center (HSS/AuC) 13 and a Discovery and Registration Function (DRF) 14 , provides the M2M device with initial network IP connectivity, possibly via a roaming partner called the Visited Operator (VO) 15 .
- the VO provides the air interface to the M2M device in this scenario.
- the VO provides the air interface to the M2M device in this scenario.
- the Platform Validation Authority (PVA) 16 there is assumed to be a trusted third party called the Platform Validation Authority (PVA) 16 .
- the PVA issues certificates for all entities in the structure and can validate the Trusted Execution Environment (TRE) of the M2M device.
- SHO Selected Home Operator
- DP-SP provisioning server
- the M2M device 11 uses the standard GSM/UMTS procedures (GPRS/PS) to decode network information, and attaches to the network of any mobile network operator.
- the M2M device sends its International Mobile Station Identity (IMSI) to the chosen operator, referred to as the Visited Operator (VO) 15 .
- IMSI International Mobile Station Identity
- VO Visited Operator
- the VO contacts the OHO 12 and asks for authentication vectors (AVs).
- AVs authentication vectors
- the HSS/AuC 13 returns the AVs, and the VO uses the received AVs to authenticate the M2M device.
- the VO provides IP connectivity for the M2M device to be able to reach the DRF 14 .
- the DRF aids the M2M device to find its new SHO 17 . This may be done by sending an OMA DM bootstrapping message 20 to the M2M device. This message also sets the device in a state that enables it to receive a new USIM.
- the M2M device 11 then connects to the SHO 17 , which requests TRE validation credentials from the M2M device. These credentials are forwarded to the trusted third party PVA 16 .
- the PVA validates the authenticity and integrity of the M2M device, and returns the status to the SHO.
- the SHO Upon receiving a positive validation, the SHO prepares a new DLUSIM, encrypts it, and transfers it to the DP-SP 19 .
- the DP-SP provisions a DLUSIM object to the M2M device, possibly by using the OMA DM protocol.
- the M2M device provisions the downloaded DLUSIM into the TRE and reports the success/failure status of the provisioning to the DP-SP.
- An embodiment of the present invention provides the device with the ability to authenticate that a provisioning of the device is actually initiated by the owner of the device.
- the invention also provides the device with the ability to authenticate the Discovery and Registration Function (DRF) involved in a change of operator.
- DRF Discovery and Registration Function
- a device is configured with a device key K Device and a plurality of one-way functions enabling derivation of a key hierarchy.
- K Device a device key
- K Provision is used to download the DLUSIM.
- different end-user services may request to set up secure end-to-end connections. This can be done by allowing the end-user services to download their specific clients onto the device. If this is done, it should be done only with the authorization from the device owner.
- the key hierarchy can be used to achieve easier operator change and also to facilitate secure end-to-end service set-up.
- K S h 1 ( K Device ,params)
- K End-user service h 4 ( K Device ,params)
- K S i+1 h 6 ( K S i ,params)
- Two exemplary scenarios are when the device owner is an enterprise and when the device owner is a consumer.
- An exemplary enterprise scenario is when the M2M device is contained in an Automatic Meter Reader.
- An exemplary consumer scenario is when the M2M device is contained in a car.
- the device owner may be an enterprise such as a utility company.
- the enterprise server 21 may be a server at the utility company, which remotely reads individual electric meter devices 22 .
- Each electric meter device includes an M2M device 31 (see FIG. 3 ) as a subset.
- M2M device 31 see FIG. 3
- the device owner may be an individual consumer.
- the end-user service 23 is shown separately.
- all key-management is handled in an invisible manner for the consumer.
- the consumer has a Mobile Equipment (ME) 24 with a Secure Element (SE) 25 at his disposal.
- ME Mobile Equipment
- SE Secure Element
- An SE is characterized in that internal data processing and data storage is not available to a user external to the SE. A user external to the SE can only access or provide data over an interface to the SE.
- the ME may be the consumer's mobile phone, which controls a car sensor device 26 in the consumer's car.
- the car sensor device also includes an M2M device 31 as a subset.
- each manager of the device can receive the keys that allow the manager to perform its duties, and keys can be handled without any resemblance with each other. Yet the impact on the manufacturing process can be kept at a minimum with storage of only one key.
- the key-deriving methods on the owner side can also be cost-effectively implemented.
- FIG. 3 is a simplified block diagram of an M2M device 31 in an exemplary embodiment of the present invention.
- the device owner is an enterprise
- device keys can be deployed into a database, for example, by reading a CD or other medium.
- the source of these device keys is the manufacturer.
- the enterprise can derive the keys required for different purposes.
- the M2M device 31 there must be support for the required one-way functions and access to the device key. There may also be functionality for updating the device with new key-deriving functions (or new set of parameters) to enable new usages throughout the lifetime of the device. Additionally, functionality for changing the device key (for example in the case of owner change) may also be implemented.
- the M2M device 31 includes a Trusted Environment (TRE) 32 , a unit for application management (OMA DM) 33 , and an end-user application 34 .
- Various management units within the TRE such as a TRE Management Unit 35 , a K Device Management Unit 36 , and a Downloadable USIM (DLUSIM) Management Unit 37 control the updating of the K Device 38 and generating of a DLUSIM 39 . Dotted lines represent outputs from the management units.
- a Functions Unit 40 controls a set of functions for deriving other keys based on the K Device 38 and inputs from the TRE Management Unit 35 . These functions include:
- K Provision ⁇ K PubM2ME , K PrivM2ME ⁇ for an M2M device.
- the private key is installed in a TRE in the device.
- the public key is distributed by some method to the owner.
- K Device is used as an authenticator. This enables the M2M device to authenticate that the issuer of the command is in possession of the valid device key.
- FIG. 4 is a simplified block diagram of an enterprise server 21 in an exemplary embodiment of the present invention.
- the enterprise server is shown at a high level interacting with a software provisioning server, a SHO, and the electric meter device 22 .
- FIG. 4 shows that the enterprise server includes management units similar to the M2M device 30 , namely, a K Device Management Unit 47 for updating K Device 38 , a Functions Unit 48 , a TRE Management Unit 49 , and a DLUSIM Management Unit 50 .
- the DLUSIM Management Unit interfaces with a SHO handler 51 and a Device handler 52 to interact with the SHO and Device as shown in FIG. 2A .
- the enterprise server also includes an Application Provisioning Unit 53 and an Application Unit 54 .
- FIG. 5 is a simplified block diagram of a device owner's mobile equipment (ME) 24 in an exemplary embodiment of the present invention.
- ME mobile equipment
- SE secure element
- FIG. 5 is a simplified block diagram of a device owner's mobile equipment (ME) 24 in an exemplary embodiment of the present invention.
- SE secure element
- the device owner is a consumer, it is natural to consider the consumer to download an application onto his secure element (SE) 25 on his ME, personalize this application with the device key, and then seamlessly interact with the different operators and service providers through this secure application which performs the key-management with the respective entities.
- SE secure element
- this application may for instance be installed via NFC in the car shop (or over the air if the mobile network operators allow it). So, the source of the device key is the manufacturer, but it can be delivered with the help of the retailer.
- the functions contained in the SE are the same as the ones described in the Enterprise server, but the GUI (Operator/Device Management Application) 56 and other non-secret information such as end-user applications 57 may be located outside of the SE. In this way, no secret information ever leaves the SE.
- FIG. 6 is an illustrative diagram illustrating a procedure for changing a device owner in an exemplary embodiment of the present invention. This procedure is shown in a message flow diagram in FIG. 7 .
- the device key is handed over from the old owner to the new owner. In this case, it is desirable to change the device key.
- the old owner might want to change the key before handing it over so that the new owner is unable to backtrack old management of the device.
- the new owner may want to change the key after the handover to prevent the old owner from being able to issue new management commands.
- FIG. 6 describes on a high level, a procedure in which an old owner (for example, a first utility company) 61 , which owns an M2M device 31 such as an electric metering device, sells and hands over the device key to a new owner such as a second utility company 62 .
- an old owner for example, a first utility company
- an M2M device 31 such as an electric metering device
- the old owner's node 61 utilizes a public key of a public/private key pair shared with the M2M device to encrypt the currently active device key K Device 0 with a change command and a secret parameter known by the old owner's node, and sends a change device key command C 1 to the M2M device 31 .
- the M2M device decrypts the command utilizing the private key of the public/private key pair and determines a device key K Device 0′ at step 64 .
- the M2M device compares K Device 0 with K Device 0 to determine if they are equal. If not, the connection is dropped, and the device key remains the same. To avoid brute force attacks, it is prudent that the time between allowed attempts is regulated, and that the device key has sufficient length.
- the M2M device calculates a new device key K Device 1 at step 65 using the currently active device key K Device 0 and the secret parameter received from the old owner's node.
- the old owner's node also calculates the new device key K Device 1 at step 66 so that the new device key K Device 1 does not have to be transmitted over the air interface.
- the old owner's node sends the new device key K Device 1 to the new owner's node 62 , preferably over a secure connection. This provides the new owner's node with control over the M2M device without disclosing the old device key, K Device 0 .
- the new owner's node 62 utilizes the public key to encrypt the new device key K Device 1 with a change command and a secret parameter known by the new owner's node, and sends a change device key command C 2 to the M2M device 31 .
- the M2M device decrypts the command utilizing the private key and determines a device key K Device 1′ at step 69 .
- the M2M device compares K Device 1′ with K Device 1 to determine if they are equal and if so, the M2M device calculates a new device key K Device 2 using the new device key K Devica 1 and the secret parameter received from the new owner's node.
- the new owner's node also calculates the new device key K Device 2 at step 71 so that the new device key K Device 2 does not have to be transmitted over the air interface.
- all commands are protected by the asymmetric key K Provision , which is not known outside of the TRE 32 of the M2M device, and therefore the new K Device 2 is impossible for the old owner to retrieve.
- This scenario is also applicable, for example, when ownership of a car is transferred between an old owner and a new owner.
- an operator change is performed without explicitly sending a USIM or a subscriber key over the air to the device.
- a change of operator is performed by the old operator handing over the subscriber key to the new operator.
- the old and the new operator would like to be able to change the keys to protect themselves against the other operator.
- FIG. 8 is a message flow diagram illustrating a procedure for changing an operator from an old operator (OHO) 81 to a new operator (SHO) 82 with the change of a subscriber key in an exemplary embodiment of the present invention.
- FIG. 9 is a message flow diagram illustrating in more detail the procedure of FIG. 8 . With reference to FIGS. 8 and 9 , the procedure will be explained.
- K S 0 a subscriber key
- K S 0 an authentication key
- K Auth 0 an authentication key
- the owner 83 of the M2M device creates a new subscription with the new operator 82
- the first key, K Auth 1 is used to authenticate the change of the subscriber key at start of the subscription period.
- K Auth 2 for the new operator and K Auth 0 for the old operator is used to change the key before handing over the device to a new operator.
- the owner may send the authentication keys to the new operator in a subscription registration message at 85 , and the new operator informs the old operator at step 86 that the new operator has a new subscription with the M2M device.
- the owner may only provide K Auth 2 to the new operator at the time of operator change. In this way, the operators do not have to store K Auth 2 for the entire subscription period of the device.
- the old operator 81 utilizes the public key to encrypt K Auth 0 with a change command and a secret parameter known by the old operator, and sends a change subscription key command C 1 to the M2M device 31 .
- the old operator then calculates the new subscriber key K S 1 at step 89 so that the new subscriber key K S 1 does not have to be transmitted over the air interface.
- the old operator sends the new subscriber key K S 1 to the new operator, preferably over a secure connection.
- the old operator then orders the M2M device to change its IMSI via OTA.
- the new operator 82 utilizes the public key to encrypt K Auth 1 with a change command and a secret parameter known by the old operator, and sends a change subscription key command C 2 to the M2M device.
- the owner 83 initiates the process, and then the old operator 81 takes over, changes the subscription key, and informs the new operator 82 .
- the new operator then again changes the subscription key, after or before which the new operator may have made a validation of the M2M device. It is important that the device is always placed in an HSS with the correct IMSI and K S . This information can be put in the HSS before the change of subscription key is made, as shown in FIG. 8 .
- owner and operator are both changed.
- the new owner may also like to switch the operator.
- the new owner should make sure that he has updated the device key before he contacts the newly selected operator and initiates the switch.
- FIG. 10 is a message flow diagram illustrating a procedure for downloading a new DLUSIM as an encrypted blob in an exemplary embodiment of the present invention.
- the enterprise server is more actively involved in downloading the new DLUSIM as an encrypted blob. This has the positive effect that the SHO can utilize any algorithm it wants for key-generation, and specifically, that it is not forced to use MILENAGE. It is also easy to have more than a *SIM in the device at one time.
- the M2M Device 31 is attached to the old home operator's (OHO) network 81 .
- the owner registers at a new Selected Home Operator (SHO) 82 and transfers the K Auth as defined above and shown in FIGS. 2A and 2B .
- the M2M Device receives a bootstrapping message instructing the M2M Device to connect to the new SHO's provisioning service.
- the bootstrapping message may include an address of the SHO and an authentication nonce.
- This bootstrapping message may be sent from the owner 83 , the SHO 82 , or from the OHO 81 . In FIG. 10 , the bootstrapping message is sent from the owner 83 .
- the new SHO and PVA 16 validate the M2M Device TRE 32 when the M2M Device attempts to connect to the provisioning service.
- a new USIM is generated and encrypted with the K Provision .
- the new USIM is downloaded as an encrypted blob to the M2M Device from the OMA DM provsioning server 19 , which may show knowledge of K Auth in this step.
- the device re-attaches to the new SHO 82 .
- the carrier for both the bootstrapping message and for the DLUSIM blob may be OMA DM.
- the authentication nonce in the bootstrapping message is based on K Auth .
- the bootstrapping message may include either a certificate identifying the new SHO, or there may be a K Auth also in the encrypted DLUSIM blob.
- the USIM is never revealed in a decrypted state outside of the TRE, and preferably K Auth is not revealed outside of the TRE either.
- the OMA DM client may be located outside of the TRE, and thus in another embodiment, K Auth is not coupled to OMA DM.
- K Auth may be used either as a password or the basis of a password, which is included in the encrypted blob as a parameter, or K Auth can be used as a integrity protection key such as the key used in a MAC used to protect the encrypted blob.
- K Auth may be utilized by the OMA DM server, but there are other setups where this is less appropriate.
- One example is when the OMA DM server is not positioned in the new SHO network. In this case, the operator may apply K Auth and confidentiality protection before handing the encrypted SIM over to the third party supplying the OMA DM service.
- OMA DM is preferred as the carrier of a DLUSIM, and it is hence preferred to use the OMA DM Mgmt Tree to organize these changes.
- the OMA DM client (which is the engine using the OMA DM Mgmt Tree) is not the sole entity involved in the management of the DLUSIM.
- the OMA DM Mgmt Tree should look correct.
- the OMA DM engine's security should be based on K Device for other management changes.
- ACL Access Control List
- the ⁇ device.owner> mgmt server may be authenticated by a K Application Provisioning . It is also acceptable if this same key or derivations of it are used for authenticating other parts of the OMA DM Mgmt Tree.
- the K Application provisioning can of course also be calculated by the TRE. So in principle, the TRE can manage the SEMO in the OMA DM Mgmt Tree itself.
- K TRE management also derived from K Device , is used in a similar fashion as in the DLUSIM download mechanism described above. This setup gives the device owner the final say in what is happening in his device, but allows the operators to check and verify that no other DLUSIMs are installed in the device, and also to securely manage their own objects.
- the K End-user service may, for example, be K S-NAF as defined in the 3GPP GBA standard; and the K Device functions as K.
- the ME function as the Bootstrapping Server Function (BSF) in the consumer case.
- BSF Bootstrapping Server Function
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
K Device i+1 =h 0(K Device i,params)
K S =h 1(K Device,params)
K TRE management =h 2(K Device,params)
K Auth =h 3(K Device,params)
K End-user service =h 4(K Device,params)
K Application provisioning =h 5(K Device,params)
K S i+1 =h 6(K S i,params)
-
- A KAuth Unit 41 for calculating an operator change authentication key to authenticate a change of subscriber key utilizing: KAuth=h3 (KDevice, params).
- A KS Unit 42 for calculating a subscriber key (both KPIMSI and the key used by the USIM) utilizing: KS=h1(KDevice, params).
- A KTRE management Unit 43 for calculating a Trusted Environment management key to update functions used by the TRE and the DLUSIM Management Unit utilizing: KTRE management=h2(KDevice, params).
- A KApplication provisioning Unit 44 for calculating an application provisioning key to manage
applications 33 outside of the TRE. The application provisioning key may be derived in the same way as the end-user-service key utilizing: KApplication provisioning=h5(KDevice, params). - A KEnd-user Application Unit 45 for calculating an end-user-service key to authenticate an end-user application to the M2M device similar to the Generic Bootstrapping Architecture (GBA) utilizing KEnd-user service=h4(KDevice, params). The end-user service key can also be used as the application provisioning key.
- A one-way function for updating the subscriber key in a USIM utilizing: KS i+1=h6(KS i, params).
Add=device.owner&Delete=device.owner&Get=*&Replace=device.owner.
Claims (11)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/606,490 US8578153B2 (en) | 2008-10-28 | 2009-10-27 | Method and arrangement for provisioning and managing a device |
EP09823906.4A EP2340654B1 (en) | 2008-10-28 | 2009-10-28 | Method for securely changing a mobile device from an old owner to a new owner. |
PCT/SE2009/051225 WO2010050886A1 (en) | 2008-10-28 | 2009-10-28 | Method for securely changing a mobile device from an old owner to a new owner. |
CN200980143734.2A CN102204299B (en) | 2008-10-28 | 2009-10-28 | Method for securely changing mobile device from old owner to new owner |
US13/711,990 US20140365769A9 (en) | 2008-10-28 | 2012-12-12 | Method and arrangement for provisioning and managing a device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10899408P | 2008-10-28 | 2008-10-28 | |
US12/606,490 US8578153B2 (en) | 2008-10-28 | 2009-10-27 | Method and arrangement for provisioning and managing a device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/711,990 Division US20140365769A9 (en) | 2008-10-28 | 2012-12-12 | Method and arrangement for provisioning and managing a device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100106967A1 US20100106967A1 (en) | 2010-04-29 |
US8578153B2 true US8578153B2 (en) | 2013-11-05 |
Family
ID=42118639
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/606,490 Active 2032-05-30 US8578153B2 (en) | 2008-10-28 | 2009-10-27 | Method and arrangement for provisioning and managing a device |
US13/711,990 Abandoned US20140365769A9 (en) | 2008-10-28 | 2012-12-12 | Method and arrangement for provisioning and managing a device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/711,990 Abandoned US20140365769A9 (en) | 2008-10-28 | 2012-12-12 | Method and arrangement for provisioning and managing a device |
Country Status (4)
Country | Link |
---|---|
US (2) | US8578153B2 (en) |
EP (1) | EP2340654B1 (en) |
CN (1) | CN102204299B (en) |
WO (1) | WO2010050886A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120047237A1 (en) * | 2009-04-16 | 2012-02-23 | Petter Arvidsson | Method, Server, Computer Program and Computer Program Product for Communicating with Secure Element |
US9280389B1 (en) | 2014-12-30 | 2016-03-08 | Tyco Fire & Security Gmbh | Preemptive operating system without context switching |
US10095746B2 (en) | 2015-12-03 | 2018-10-09 | At&T Intellectual Property I, L.P. | Contextual ownership |
US10268485B2 (en) | 2014-02-28 | 2019-04-23 | Tyco Fire & Security Gmbh | Constrained device and supporting operating system |
US10293787B2 (en) * | 2017-08-10 | 2019-05-21 | Ford Global Technologies, Llc | Vehicle key management |
US10440006B2 (en) | 2017-06-21 | 2019-10-08 | Microsoft Technology Licensing, Llc | Device with embedded certificate authority |
US10558812B2 (en) | 2017-06-21 | 2020-02-11 | Microsoft Technology Licensing, Llc | Mutual authentication with integrity attestation |
US10938560B2 (en) | 2017-06-21 | 2021-03-02 | Microsoft Technology Licensing, Llc | Authorization key escrow |
US10977052B2 (en) | 2013-05-06 | 2021-04-13 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
US11063912B2 (en) * | 2013-09-13 | 2021-07-13 | Vodafone Ip Licensing Limited | Methods and systems for communicating with an M2M device |
US11374760B2 (en) | 2017-09-13 | 2022-06-28 | Microsoft Technology Licensing, Llc | Cyber physical key |
US11747430B2 (en) | 2014-02-28 | 2023-09-05 | Tyco Fire & Security Gmbh | Correlation of sensory inputs to identify unauthorized persons |
US12256024B2 (en) | 2017-06-21 | 2025-03-18 | Microsoft Technology Licensing, Llc | Device provisioning |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8578153B2 (en) * | 2008-10-28 | 2013-11-05 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangement for provisioning and managing a device |
CN104640104A (en) * | 2009-03-05 | 2015-05-20 | 交互数字专利控股公司 | Method of WTRU for establishing network connection and WTRU |
WO2011025876A1 (en) * | 2009-08-27 | 2011-03-03 | Interdigital Patent Holdings, Inc. | Method and apparatus for solving limited addressing space in machine-to-machine (m2m) environments |
CN102026149B (en) * | 2009-09-14 | 2015-08-12 | 中兴通讯股份有限公司 | The method and system that a kind of M2M equipment home network operator changes |
CN103190134B (en) * | 2010-08-31 | 2016-03-23 | 瑞典爱立信有限公司 | ISIM can be downloaded |
CN102142980B (en) * | 2010-10-27 | 2014-05-07 | 华为技术有限公司 | Method and gateway for remotely managing sensor network topology |
KR20120067459A (en) * | 2010-12-16 | 2012-06-26 | 삼성전자주식회사 | Method and apparatus for authenticating per m2m device between service provider and mobile network operator |
GB201021784D0 (en) * | 2010-12-22 | 2011-02-02 | Vodafone Ip Licensing Ltd | SIM Locking |
US20120203824A1 (en) | 2011-02-07 | 2012-08-09 | Nokia Corporation | Method and apparatus for on-demand client-initiated provisioning |
WO2012136867A1 (en) * | 2011-04-05 | 2012-10-11 | Valid Soluciones Tecnologicas, S.A.U. | Method and system for the remote provision of subscriptions |
US8707022B2 (en) * | 2011-04-05 | 2014-04-22 | Apple Inc. | Apparatus and methods for distributing and storing electronic access clients |
US9059980B2 (en) | 2011-05-26 | 2015-06-16 | First Data Corporation | Systems and methods for authenticating mobile devices |
EP2538707B1 (en) * | 2011-06-21 | 2019-08-28 | Alcatel Lucent | Method for uploading subscriber credentials and associated equipment |
KR20130012243A (en) * | 2011-07-08 | 2013-02-01 | 주식회사 케이티 | Method for changing mno of embedded sim based on privilege, embedded sim and recording medium for the same |
KR20130006258A (en) | 2011-07-08 | 2013-01-16 | 주식회사 케이티 | Method for changing mno of embedded sim based on dynamic key generation, embedded sim and recording medium for the same |
KR101879457B1 (en) * | 2011-07-08 | 2018-07-18 | 주식회사 케이티 | Method for Managing Key of Embedded SIM, Embedded SIM and recording medium for the same |
US8255687B1 (en) | 2011-09-15 | 2012-08-28 | Google Inc. | Enabling users to select between secure service providers using a key escrow service |
KR101363753B1 (en) * | 2011-10-18 | 2014-02-17 | 에스케이씨앤씨 주식회사 | Method and system for changing key on SE in mobile device |
CN103096308B (en) * | 2011-11-01 | 2016-01-20 | 华为技术有限公司 | The method of group cipher key generating and relevant device |
US9569237B2 (en) * | 2011-12-29 | 2017-02-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Virtual machine management using a downloadable subscriber identity module |
WO2013100636A1 (en) | 2011-12-30 | 2013-07-04 | 에스케이씨앤씨 주식회사 | Master tsm |
AU2013207623B2 (en) * | 2012-02-28 | 2014-04-03 | Google Llc | Portable secure element |
US8385553B1 (en) * | 2012-02-28 | 2013-02-26 | Google Inc. | Portable secure element |
CN103313241B (en) * | 2012-03-15 | 2016-12-14 | 中国移动通信集团公司 | A kind of SE key management method, business platform, management platform and system |
US8429409B1 (en) | 2012-04-06 | 2013-04-23 | Google Inc. | Secure reset of personal and service provider information on mobile devices |
CA2810360C (en) | 2012-06-27 | 2016-05-10 | Rogers Communications Inc. | System and method for remote provisioning of embedded universal integrated circuit cards |
EP2704466A1 (en) * | 2012-09-03 | 2014-03-05 | Alcatel Lucent | Smart card personnalization with local generation of keys |
EP2712222B1 (en) | 2012-09-25 | 2020-04-01 | Alcatel Lucent | Confidential provisioning of secret keys over the air |
CN103702377B (en) * | 2012-09-27 | 2017-04-12 | 华为终端有限公司 | Network switch method and equipment |
JP6055111B2 (en) * | 2013-01-18 | 2016-12-27 | エルジー エレクトロニクス インコーポレイティド | Method and apparatus for proximity control in a wireless communication system |
US9503485B1 (en) | 2013-03-01 | 2016-11-22 | Whatsapp Inc. | Connecting communicating devices in a multi-server communication system |
CN104219687B (en) | 2013-06-05 | 2018-07-13 | 华为终端有限公司 | Detect the method and device of target network covering |
EP2824945A1 (en) * | 2013-07-11 | 2015-01-14 | Alcatel Lucent | Sim proxy module for roaming in a mobile network |
US9633210B2 (en) * | 2013-09-13 | 2017-04-25 | Microsoft Technology Licensing, Llc | Keying infrastructure |
KR20160082967A (en) * | 2013-11-08 | 2016-07-11 | 엘지전자 주식회사 | Method for subscription and notification in m2m communication system and device therefor |
US9635014B2 (en) * | 2014-02-21 | 2017-04-25 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating client credentials |
GB2527276B (en) * | 2014-04-25 | 2020-08-05 | Huawei Tech Co Ltd | Providing network credentials |
GB2526619A (en) * | 2014-05-30 | 2015-12-02 | Vodafone Ip Licensing Ltd | Service provisioning |
EP2993608A1 (en) * | 2014-09-03 | 2016-03-09 | Gemalto Sa | A method for changing the ownership of a secure element |
WO2016055417A1 (en) * | 2014-10-10 | 2016-04-14 | Deutsche Telekom Ag | Method for provisioning an embedded universal integrated circuit entity within an electronic device |
EP3205133B1 (en) * | 2014-10-10 | 2021-04-07 | Deutsche Telekom AG | Method for transferring an assignment regarding an embedded universal integrated circuit entity from a first mobile network operator to a second mobile network operator |
EP3010264A1 (en) * | 2014-10-16 | 2016-04-20 | Gemalto Sa | Method to manage subscriptions in a provisioning server |
US10671980B2 (en) | 2014-10-20 | 2020-06-02 | Mastercard International Incorporated | Systems and methods for detecting potentially compromised payment cards |
US9439069B2 (en) * | 2014-12-17 | 2016-09-06 | Intel IP Corporation | Subscriber identity module provider apparatus for over-the-air provisioning of subscriber identity module containers and methods |
US10992472B2 (en) * | 2015-02-27 | 2021-04-27 | Pcms Holdings, Inc. | Systems and methods for secure roll-over of device ownership |
CN104869562A (en) * | 2015-04-24 | 2015-08-26 | 小米科技有限责任公司 | Information transmission method, device and system |
US9578008B2 (en) * | 2015-05-11 | 2017-02-21 | Intel Corporation | Technologies for secure bootstrapping of virtual network functions |
US20160364787A1 (en) * | 2015-06-09 | 2016-12-15 | Intel Corporation | System, apparatus and method for multi-owner transfer of ownership of a device |
EP3122083A1 (en) * | 2015-07-21 | 2017-01-25 | Giesecke & Devrient GmbH | Method for providing a subscription to a secure element |
US10263968B1 (en) * | 2015-07-24 | 2019-04-16 | Hologic Inc. | Security measure for exchanging keys over networks |
EP3255913A1 (en) * | 2015-10-26 | 2017-12-13 | Baldur Jehnke | Low-cost phone number porting |
US10037436B2 (en) | 2015-12-11 | 2018-07-31 | Visa International Service Association | Device using secure storage and retrieval of data |
EP3253021A1 (en) * | 2016-06-03 | 2017-12-06 | Gemalto Sa | A method for managing the status of a connected device |
US10820265B2 (en) | 2016-10-07 | 2020-10-27 | Nokia Technologies Oy | IoT device connectivity provisioning |
JP6855918B2 (en) * | 2017-05-16 | 2021-04-07 | 株式会社デンソー | Vehicle systems and electronic control devices that process encryption keys |
DE102017116937A1 (en) * | 2017-07-26 | 2019-01-31 | Techem Energy Services Gmbh | Detection device, service device, building communication system and method for authorizing a service device on a detection device |
US10833926B2 (en) * | 2017-11-17 | 2020-11-10 | T-Mobile Usa, Inc. | Touchless secure bootstrapping of IoT devices |
EP3910873B1 (en) * | 2020-05-15 | 2025-01-01 | Kamstrup A/S | Key-management for advanced metering infrastructure |
US11328111B2 (en) | 2020-09-25 | 2022-05-10 | Intel Corporation | Broadcast remote sealing for scalable trusted execution environment provisioning |
KR20220103025A (en) * | 2021-01-14 | 2022-07-21 | 현대자동차주식회사 | Method and apparatus for replacing security key in machine to machine system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030149666A1 (en) * | 2000-11-20 | 2003-08-07 | Davies Philip Michael | Personal authentication system |
US20050155036A1 (en) * | 2003-12-19 | 2005-07-14 | Nokia Corporation | Application server addressing |
WO2006092642A1 (en) | 2005-03-01 | 2006-09-08 | Nokia Corporation | Access rights control in a device management system |
US20070003062A1 (en) * | 2005-06-30 | 2007-01-04 | Lucent Technologies, Inc. | Method for distributing security keys during hand-off in a wireless communication system |
US20070250617A1 (en) | 2006-04-21 | 2007-10-25 | Pantech Co., Ltd. | Method for managing user domain |
US20080282090A1 (en) * | 2007-05-07 | 2008-11-13 | Jonathan Leybovich | Virtual Property System for Globally-Significant Objects |
US20080301463A1 (en) * | 2004-09-14 | 2008-12-04 | Dirk Michelsen | Method for Documenting Property or Possession and Transfer of Property or Possession of a Merchandise |
US20090217348A1 (en) * | 2008-02-22 | 2009-08-27 | Patrik Mikael Salmela | Methods and Apparatus for Wireless Device Registration |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI107486B (en) * | 1999-06-04 | 2001-08-15 | Nokia Networks Oy | Providing authentication and encryption in a mobile communication system |
GB2377589B (en) * | 2001-07-14 | 2005-06-01 | Motorola Inc | Ciphering keys for different cellular communication networks |
US7774008B2 (en) * | 2006-12-22 | 2010-08-10 | Cellco Partnership | MDN-less SMS messaging (network solution) for wireless M2M application |
EP3010205A1 (en) * | 2008-01-18 | 2016-04-20 | Interdigital Patent Holdings, Inc. | Method and apparatus for performing validation of a machine to machine communication equipment |
EP2235911A4 (en) * | 2008-01-22 | 2012-08-08 | Ericsson Telefon Ab L M | DISTRIBUTION OF SECURITY POLICY TO COMMUNICATION TERMINALS |
US20090191857A1 (en) * | 2008-01-30 | 2009-07-30 | Nokia Siemens Networks Oy | Universal subscriber identity module provisioning for machine-to-machine communications |
US20090217038A1 (en) * | 2008-02-22 | 2009-08-27 | Vesa Petteri Lehtovirta | Methods and Apparatus for Locating a Device Registration Server in a Wireless Network |
US20090253409A1 (en) * | 2008-04-07 | 2009-10-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of Authenticating Home Operator for Over-the-Air Provisioning of a Wireless Device |
US8578153B2 (en) * | 2008-10-28 | 2013-11-05 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangement for provisioning and managing a device |
EP2721849A4 (en) * | 2011-06-15 | 2015-03-04 | Ericsson Telefon Ab L M | Provisioning connectivity service data in a telecommunications network |
-
2009
- 2009-10-27 US US12/606,490 patent/US8578153B2/en active Active
- 2009-10-28 EP EP09823906.4A patent/EP2340654B1/en active Active
- 2009-10-28 WO PCT/SE2009/051225 patent/WO2010050886A1/en active Application Filing
- 2009-10-28 CN CN200980143734.2A patent/CN102204299B/en active Active
-
2012
- 2012-12-12 US US13/711,990 patent/US20140365769A9/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030149666A1 (en) * | 2000-11-20 | 2003-08-07 | Davies Philip Michael | Personal authentication system |
US20050155036A1 (en) * | 2003-12-19 | 2005-07-14 | Nokia Corporation | Application server addressing |
US20080301463A1 (en) * | 2004-09-14 | 2008-12-04 | Dirk Michelsen | Method for Documenting Property or Possession and Transfer of Property or Possession of a Merchandise |
WO2006092642A1 (en) | 2005-03-01 | 2006-09-08 | Nokia Corporation | Access rights control in a device management system |
US20070003062A1 (en) * | 2005-06-30 | 2007-01-04 | Lucent Technologies, Inc. | Method for distributing security keys during hand-off in a wireless communication system |
US20070250617A1 (en) | 2006-04-21 | 2007-10-25 | Pantech Co., Ltd. | Method for managing user domain |
US20080282090A1 (en) * | 2007-05-07 | 2008-11-13 | Jonathan Leybovich | Virtual Property System for Globally-Significant Objects |
US20090217348A1 (en) * | 2008-02-22 | 2009-08-27 | Patrik Mikael Salmela | Methods and Apparatus for Wireless Device Registration |
Non-Patent Citations (2)
Title |
---|
Open Mobile Alliance, "Device Management Requirements". Approved Version 1.2. Feb. 9, 2007. |
Tuladhar, Summit. "Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Network" Pub. Date. 2007. pp. 1-50. * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9572025B2 (en) * | 2009-04-16 | 2017-02-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Method, server, computer program and computer program product for communicating with secure element |
US20120047237A1 (en) * | 2009-04-16 | 2012-02-23 | Petter Arvidsson | Method, Server, Computer Program and Computer Program Product for Communicating with Secure Element |
US10977052B2 (en) | 2013-05-06 | 2021-04-13 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
US11829774B2 (en) | 2013-05-06 | 2023-11-28 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
US11354136B2 (en) | 2013-05-06 | 2022-06-07 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
US11063912B2 (en) * | 2013-09-13 | 2021-07-13 | Vodafone Ip Licensing Limited | Methods and systems for communicating with an M2M device |
US10268485B2 (en) | 2014-02-28 | 2019-04-23 | Tyco Fire & Security Gmbh | Constrained device and supporting operating system |
US11747430B2 (en) | 2014-02-28 | 2023-09-05 | Tyco Fire & Security Gmbh | Correlation of sensory inputs to identify unauthorized persons |
US9280389B1 (en) | 2014-12-30 | 2016-03-08 | Tyco Fire & Security Gmbh | Preemptive operating system without context switching |
US9910701B2 (en) | 2014-12-30 | 2018-03-06 | Tyco Fire & Security Gmbh | Preemptive operating system without context switching |
US10095746B2 (en) | 2015-12-03 | 2018-10-09 | At&T Intellectual Property I, L.P. | Contextual ownership |
US10685028B2 (en) | 2015-12-03 | 2020-06-16 | At&T Intellectual Property I, L.P. | Contextual ownership |
US10938560B2 (en) | 2017-06-21 | 2021-03-02 | Microsoft Technology Licensing, Llc | Authorization key escrow |
US10558812B2 (en) | 2017-06-21 | 2020-02-11 | Microsoft Technology Licensing, Llc | Mutual authentication with integrity attestation |
US10440006B2 (en) | 2017-06-21 | 2019-10-08 | Microsoft Technology Licensing, Llc | Device with embedded certificate authority |
US12256024B2 (en) | 2017-06-21 | 2025-03-18 | Microsoft Technology Licensing, Llc | Device provisioning |
US10293787B2 (en) * | 2017-08-10 | 2019-05-21 | Ford Global Technologies, Llc | Vehicle key management |
US11374760B2 (en) | 2017-09-13 | 2022-06-28 | Microsoft Technology Licensing, Llc | Cyber physical key |
Also Published As
Publication number | Publication date |
---|---|
US20100106967A1 (en) | 2010-04-29 |
EP2340654A4 (en) | 2013-08-07 |
CN102204299A (en) | 2011-09-28 |
CN102204299B (en) | 2014-04-09 |
EP2340654B1 (en) | 2018-04-25 |
WO2010050886A1 (en) | 2010-05-06 |
EP2340654A1 (en) | 2011-07-06 |
US20140365769A9 (en) | 2014-12-11 |
US20130185560A1 (en) | 2013-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8578153B2 (en) | Method and arrangement for provisioning and managing a device | |
KR102026612B1 (en) | Method for Creating Trust Relationship and Embedded UICC | |
US10694369B2 (en) | Profile management method, embedded UICC, and device provided with the embedded UICC | |
JP6033291B2 (en) | Service access authentication method and system | |
US9332575B2 (en) | Method and apparatus for enabling connectivity in a communication network | |
US20180091978A1 (en) | Universal Integrated Circuit Card Having A Virtual Subscriber Identity Module Functionality | |
KR101287227B1 (en) | Virtual subscriber identity module | |
EP2255507B1 (en) | A system and method for securely issuing subscription credentials to communication devices | |
KR102382851B1 (en) | Apparatus and methods for esim device and server to negociate digital certificates | |
KR101907814B1 (en) | a remote subscription management method of the eUICC, | |
US20090191857A1 (en) | Universal subscriber identity module provisioning for machine-to-machine communications | |
US20090253409A1 (en) | Method of Authenticating Home Operator for Over-the-Air Provisioning of a Wireless Device | |
KR102293683B1 (en) | Apparatus and Methods for Access Control on eSIM | |
JP5468623B2 (en) | Apparatus and method for protecting bootstrap messages in a network | |
EP1993301B1 (en) | Method and apparatus of operating a wireless home area network | |
KR20130032873A (en) | Wireless network authentication apparatus and methods | |
KR20120044916A (en) | Methods and apparatus for delivering electronic identification components over a wireless network | |
KR101891330B1 (en) | Subscription Method for Embedded UICC using Trusted Subscription Manager and Embedded UICC Architecture therefor | |
Chitroub et al. | Securing mobile iot deployment using embedded sim: Concerns and solutions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL),SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JOHANSSON, MATTIAS;ENGLUND, HAKAN;SIGNING DATES FROM 20091023 TO 20091026;REEL/FRAME:023432/0777 Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JOHANSSON, MATTIAS;ENGLUND, HAKAN;SIGNING DATES FROM 20091023 TO 20091026;REEL/FRAME:023432/0777 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |